IDNameBaselinesPriorityThreats
    LowModerateHigh
    AC-6(3)Network Access To Privileged Commands  
    • P1
    STRIDE-LM
    (4)Separate Processing Domains   
    • P1
    STRIDE-LM
    (5)Privileged Accounts 
    • P1
    STRIDE-LM
    (6)Privileged Access By Non-Organizational Users   
    • P1
    STRIDE-LM
    (7)Review Of User Privileges   
    • P1
    STRIDE-LM
    (8)Privilege Levels For Code Execution   
    • P1
    STRIDE-LM
    (9)Auditing Use Of Privileged Functions 
    • P1
    STRIDE-LM
    (10)Prohibit Non-Privileged Users From Executing Privileged Functions 
    • P1
    STRIDE-LM
    AC-7Unsuccessful Logon Attempts
    • P2
    STRIDE-LM
    (2)Purge / Wipe Mobile Device   
    • P2
    STRIDE-LM
    AC-8System Use Notification
    • P1
    STRIDE-LM
    AC-9Previous Logon (Access) Notification   
    • P0
    STRIDE-LM
    (1)Unsuccessful Logons   
    • P0
    STRIDE-LM
    (2)Successful / Unsuccessful Logons   
    • P0
    STRIDE-LM
    (3)Notification Of Account Changes   
    • P0
    STRIDE-LM
    (4)Additional Logon Information   
    • P0
    STRIDE-LM
    AC-10Concurrent Session Control  
    • P3
    STRIDE-LM
    AC-11Session Lock 
    • P3
    STRIDE-LM
    (1)Pattern-Hiding Displays 
    • P3
    STRIDE-LM
    AC-12Session Termination 
    • P2
    STRIDE-LM
    (1)User-Initiated Logouts / Message Displays   
    • P2
    STRIDE-LM
    AC-14Permitted Actions Without Identification Or Authentication
    • P3
    STRIDE-LM
    AC-16Security Attributes   
    • P0
    STRIDE-LM
    (1)Dynamic Attribute Association   
    • P0
    STRIDE-LM
    (2)Attribute Value Changes By Authorized Individuals   
    • P0
    STRIDE-LM
    (3)Maintenance Of Attribute Associations By Information System   
    • P0
    STRIDE-LM
    (4)Association Of Attributes By Authorized Individuals   
    • P0
    STRIDE-LM
    (5)Attribute Displays For Output Devices   
    • P0
    STRIDE-LM
    (6)Maintenance Of Attribute Association By Organization   
    • P0
    STRIDE-LM
    (7)Consistent Attribute Interpretation   
    • P0
    STRIDE-LM
    (8)Association Techniques / Technologies   
    • P0
    STRIDE-LM
    (9)Attribute Reassignment   
    • P0
    STRIDE-LM
    (10)Attribute Configuration By Authorized Individuals   
    • P0
    STRIDE-LM
    AC-17Remote Access
    • P1
    STRIDE-LM
    (1)Automated Monitoring / Control 
    • P1
    STRIDE-LM
    (2)Protection Of Confidentiality / Integrity Using Encryption 
    • P1
    STRIDE-LM
    (3)Managed Access Control Points 
    • P1
    STRIDE-LM
    (4)Privileged Commands / Access 
    • P1
    STRIDE-LM
    (6)Protection Of Information   
    • P1
    STRIDE-LM
    (9)Disconnect / Disable Access   
    • P1
    STRIDE-LM
    AC-18Wireless Access
    • P1
    STRIDE-LM
    (1)Authentication And Encryption 
    • P1
    STRIDE-LM
    (3)Disable Wireless Networking   
    • P1
    STRIDE-LM
    (4)Restrict Configurations By Users  
    • P1
    STRIDE-LM
    (5)Antennas / Transmission Power Levels  
    • P1
    STRIDE-LM
    AC-19Access Control For Mobile Devices
    • P1
    STRIDE-LM
    (4)Restrictions For Classified Information   
    • P1
    STRIDE-LM
    (5)Full Device / Container-Based Encryption 
    • P1
    STRIDE-LM
    AC-20Use Of External Information Systems
    • P1
    STRIDE-LM
    (1)Limits On Authorized Use 
    • P1
    STRIDE-LM